• Title/Summary/Keyword: Java Method Signature

Search Result 8, Processing Time 0.02 seconds

A Study on Authentication Server of Dynamic Signature Verification System (동적 서명인증시스템의 인증 서버에 관한 연구)

  • Kim Jin-Whan;Cho Hyuh-Gyu;Cha Eui-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.3
    • /
    • pp.49-65
    • /
    • 2005
  • This paper is a research on the dynamic signature verification of error rate which are false rejection rate and false acceptance rate, the size of signature verification engine, the size of the characteristic vectors of a signature, the ability to distinguish similar signatures, and so on. We suggest feature extraction and comparison method of the advanced signature verification. Also, we have implemented web authentication server with Java technology for supporting various OS Platforms and designed for more efficient user interfaces.

  • PDF

Automatic identification of Java Method Naming Patterns Using Cascade K-Medoids

  • Kim, Tae-young;Kim, Suntae;Kim, Jeong-Ah;Choi, Jae-Young;Lee, Jee-Huong;Cho, Youngwha;Nam, Young-Kwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.873-891
    • /
    • 2018
  • This paper suggests an automatic approach to extracting Java method implementation patterns associated with method identifiers using Cascade K-Medoids. Java method implementation patterns indicate recurring implementations for achieving the purpose described in the method identifier with the given parameters and return type. If the implementation is different from the purpose, readers of the code tend to take more time to comprehend the method, which eventually affects to the increment of software maintenance cost. In order to automatically identify implementation patterns and its representative sample code, we first propose three groups of feature vectors for characterizing the Java method signature, method body and their relation. Then, we apply Cascade K-Medoids by enhancing the K-Medoids algorithm with the Calinski and Harrabasez algorithm. As the evaluation of our approach, we identified 16,768 implementation patterns of 7,169 method identifiers from 50 open source projects. The implementation patterns have been validated by the 30 industrial practitioners with from 1 to 6 years industrial experience, resulting in 86% of the precision.

Implementation of User Interface and Web Server for Dynamic Signature Verification

  • Kim, Jin-Whan;Cho, Hyuk-Gyu;Cha, Eui-Young
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.299-304
    • /
    • 2005
  • This paper is a research on the dynamic signature verification of error rate which are false rejection rate and false acceptance rate, the size of signature verification engine, the size of the characteristic vectors of a signature, the ability to distinguish similar signatures, and so on. We suggest feature extraction and comparison method of the signature verification. Also, we have implemented our system with Java technology for more efficient user interfaces and various OS Platforms.

  • PDF

Implementation of SEED Using Java Card API (자바 카드 API를 이용한 SEED 알고리즘 구현)

  • 채철주;이성현;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.283-288
    • /
    • 2004
  • Authentication and digital signature make secured existing contract in remote spot. But, It required method of storing and managing secret, such as private key password. For this method, we make efforts solution of security with smart cart, such as java card. This paper implement SEED algorithm based on Java Card

  • PDF

Enhancement of Android Runtime Performance using Method Signature (Method Signature를 이용한 안드로이드 런타임 성능 향상)

  • Joe, In-Whee;Kim, Won-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1323-1328
    • /
    • 2011
  • In this paper, we have shown Dalvik virtual machine implementation to reduce the profiling overhead from the trace of the JIT compiler for the specific method. By running the same Java method on the original Dalvik VM and the modified Dalvik VM, we have achieved around 30% performance improvement with this algorithm. In this paper, to increase the reader's understanding of Android Dalvik virtual machine, we will explain the architecture of Dalvik JIT compiler and we will provide the detailed explanation with source codes for modified parts of Dalvik virtual machine. From the industry perspective, we can expect competitive benefits over the competitors with performance improvement in Android core.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

A Strengthened Android Signature Management Method

  • Cho, Taenam;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1210-1230
    • /
    • 2015
  • Android is the world's most utilized smartphone OS which consequently, also makes it an attractive target for attackers. The most representative method of hacking used against Android apps is known as repackaging. This attack method requires extensive knowledge about reverse engineering in order to modify and insert malicious codes into the original app. However, there exists an easier way which circumvents the limiting obstacle of the reverse engineering. We have discovered a method of exploiting the Android code-signing process in order to mount a malware as an example. We also propose a countermeasure to prevent this attack. In addition, as a proof-of-concept, we tested a malicious code based on our attack technique on a sample app and improved the java libraries related to code-signing/verification reflecting our countermeasure.

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.